Cloud and Fog Computing Platforms for Internet of Things
- Length: 198 pages
- Edition: 1
- Language: English
- Publisher: Chapman & Hall
- Publication Date: 2022-06-08
- ISBN-10: 1032101504
- ISBN-13: 9781032101507
- Sales Rank: #0 (See Top 100 Books)
Today, relevant data are typically delivered to cloud-based servers for storing and analysis in order to extract key features and enable enhanced applications beyond the basic transmission of raw data and to realize the possibilities associated with the impending Internet of Things (IoT). To allow for quicker, more efficient, and expanded privacy-preserving services, a new trend called Fog Computing has emerged: moving these responsibilities to the network’s edge.
Traditional centralized cloud computing paradigms confront new problems posed by IoT application growth, including high latency, limited storage, and outages due to a lack of available resources. Fog Computing puts the cloud and IoT devices closer together to address these issues. Instead of sending IoT data to the cloud, the fog processes and stores it locally at IoT devices. Unlike the cloud, fog-based services have a faster reaction time and better quality overall.
Fog Computing, Cloud Computing, and their connectivity with the IoT are discussed in this book, with an emphasis on the advantages and implementation issues. It also explores the various architectures and appropriate IoT applications. Fog Computing, Cloud Computing, and Internet of Things are being suggested as potential research directions.
Features:
- A systematic overview of the state-of-the-art in Cloud Computing, Fog Computing, and Internet of Things
- Recent research results and some pointers to future advancements in architectures and methodologies
- Detailed examples from clinical studies using several different data sets
Cover Half Title Series Page Title Page Copyright Page Table of Contents Preface Editor Biography Contributors Chapter 1: Resource Allocation Techniques in Cloud Computing 1.1 Introduction 1.2 Resource Management 1.3 Virtualization 1.4 Resource Allocation Algorithms 1.4.1 Priority-Based Resource Allocation Algorithm (PB-RA Algorithm) 1.4.2 Round-Robin-Based Resource Allocation Algorithm (RRB-RA Algorithm) 1.4.3 QoS-Based Resource Allocation Algorithms (QoSB-RA Algorithms) 1.4.4 Energy-Aware-Based Resource Allocation Algorithms (EAB-RA Algorithms) 1.4.5 Machine Learning-Based Resource Allocation Algorithms (MLB-RA Algorithms) 1.4.6 Dynamic Resource Allocation Algorithms (DRA Algorithms) 1.5 Resource Allocation Factors 1.6 Conclusion and Future Works References Chapter 2: Transforming Healthcare through Internet of Things 2.1 Introduction 2.2 Application of IoT in Healthcare 2.3 IoT-Enabled Technologies and Medical Devices 2.4 IoT and its Potential Transformations in Healthcare 2.4.1 Continuous Monitoring of Hospital Routines 2.4.2 Safety and Adherence Tools 2.4.3 Quality, Compliance, and Monitoring 2.4.4 Closed-Loop Diagnosis for Treatment 2.4.5 Real-World Data and Environments 2.4.6 Digital Biomarkers to Capture Disease Symptoms 2.5 IoT and Its Advantages to the Health Sector 2.5.1 Cancer Treatment 2.5.2 Diabetes Management 2.5.3 Treatment of Asthma 2.5.4 IoT in Mental Healthcare 2.6 Challenges of IoT in Healthcare 2.6.1 Data Security and Privacy 2.6.2 Integration of Multiple Devices and Protocols 2.6.3 Data Overload and Accuracy 2.6.4 Investment 2.6.5 Existence of Obsolete Software Infrastructure 2.7 Future of IoT in Healthcare 2.8 Conclusions and Future Scope References Chapter 3: IoT Motivated Cyber-Physical and Industrial Internet Systems 3.1 Introduction 3.2 Ambient Intelligence 3.2.1 Sensors 3.2.2 Actuators 3.3 Cyber-Physical System 3.4 Next-Generation Sensors 3.5 Industrial Internet of Things 3.5.1 Industrial Internet System 3.5.2 Industrial Sensing and Actuation 3.6 Industry 4.0 3.7 Case Studies 3.7.1 Lean Production System 3.7.2 Unmanned Aerial Vehicles 3.8 Conclusion References Chapter 4: Internet of Things in E-commerce:: A Thematic Analysis 4.1 Introduction 4.2 Internet of Things (IoT): Origin, Development, and Definition 4.2.1 Origin 4.2.2 Development 4.2.2.1 Phase I The Devices and Connectivity Period (2005–2008) 4.2.2.2 Phase II The Machine-to-Machine Period (2009–2011) 4.2.2.3 Phase III The HCI Period (2012–2014) 4.2.2.4 Phase IV The Smart Period (2015–2017) 4.2.3 Definition 4.3 E-commerce: Origin, Development, and Definition 4.3.1 Origin and Development 4.3.1.1 Phase I Electronic Data Interchange (EDI) based E-commerce (the 1960s) 4.3.1.2 Phase II Internet-Based E-commerce (the early 1990s) 4.3.1.3 Phase III E-concept E-commerce (the early 2000s) 4.3.2 Definition 4.4 Methodology 4.5 Data Description 4.6 Thematic Analysis of Internet of Things in E-commerce 4.6.1 Motor Themes 4.6.1.1 Subtheme 1 Innovation Adoption 4.6.1.2 Subtheme 2 E-commerce 4.6.1.3 Subtheme 3 Behavior 4.6.2 Niche Themes 4.6.2.1 Subtheme 1 Opportunities 4.6.2.2 Subtheme 2 Challenges 4.6.2.3 Subtheme 3 Quality 4.6.3 Emerging or Disappearing Theme 4.6.3.1 Subtheme 1 Information 4.6.4 Basic Themes 4.6.4.1 Subtheme 1 Internet 4.6.4.2 Subtheme 2 Model 4.6.5 Axial Themes 4.6.5.1 Subtheme 1 Management 4.6.5.2 Subtheme 2 Internet of Things 4.7 Topic Trend Analysis and Thematic Evolution 4.8 Co-occurrence Network 4.9 Implications 4.10 Conclusion References Chapter 5: Data Security and Privacy in Fog Computing Applications 5.1 Introduction 5.2 Review Procedure 5.2.1 Security-Related Issues 5.2.2 Existing Fog Computing Security Solutions 5.2.3 Privacy-Preserving in Fog Computing 5.3 Conclusion 5.4 Future Scope References Chapter 6: Energy-Efficient Cloud and Fog Computing in Internet of Things:: Techniques and Challenges 6.1 Introduction 6.1.1 Architecture of Fog Computing 6.2 Energy-Efficient Cloud: Enabling Technologies 6.2.1 Virtualization 6.2.2 Multicore Architectures 6.3 Energy Efficiency in Cloud Data Centers 6.4 Energy-Efficient Approaches in Fog Computing 6.4.1 Resource Management Techniques 6.4.1.1 Placement of Application 6.4.1.2 Resource Scheduling 6.4.1.3 Task Offloading 6.4.1.4 Load Balancing 6.4.1.5 Allocation of Resources 6.4.1.6 Resource Provisioning Approaches 6.4.1.7 Computational Offloading 6.4.1.8 Caching Mechanism 6.4.2 Green Renewable Energy in Fog Environment 6.5 Research Challenges 6.6 Case Studies 6.7 Conclusion References Chapter 7: Deployment of Distributed Clustering Approach in WSNs and IoTs 7.1 Introduction 7.2 Relevant Work 7.3 Modern Research and Deployment 7.4 Why Need WSNs and IoT in Daily Life 7.5 Deployment of Low Energy Distributed Clustering Approach 7.6 Methods of Selection of Cluster Supervisor (Head) 7.7 Implementation 7.8 Conclusions and Future Scope References Chapter 8: Long-Range IoT for Agricultural Acquisition through Cloud Computing 8.1 Introduction 8.2 Related Work 8.3 System Design Architecture 8.3.1 Sensor Module/Input Module 8.3.2 Input Power Module 8.3.3 Controller Module 8.3.4 Communication Module 8.4 Hardware Implementation 8.4.1 Case 1: Sunny Day 8.4.2 Case 2: Rainy Day 8.5 Conclusion and Scope for Future References Chapter 9: Resource Allocation with Task Scheduling in Cloud Computing 9.1 Introduction 9.2 Related Works 9.3 The Motivation 9.3.1 System Manager 9.3.2 Meta Task About Machines 9.4 Problem Definitions 9.4.1 Server Specification 9.4.2 Task Measurement 9.4.3 The Completion Time of the Tasks of the Server 9.4.4 Required Methods 9.5 Performance Metrics 9.5.1 Matrix Formulation 9.5.2 Mathematical Representation 9.6 Proposed Work 9.7 Result Analysis 9.8 Conclusion and Future Work References Chapter 10: Service Availability of Virtual Machines in Cloud Computing 10.1 Introduction 10.2 Virtualization 10.2.1 Virtualization Approaches 10.2.1.1 Full Virtualization 10.2.1.2 Paravirtualization 10.2.1.3 Hardware-Assisted Virtualization 10.2.2 Virtualization Deployment 10.3 Resource Availability in Cloud Computing 10.3.1 Cloud Computing Security 10.4 Availability Measurement in Cloud Computing 10.5 Virtual Machine Migration in Cloud Computing 10.5.1 VM Live Migration Techniques 10.6 VM Live Migration Evaluation 10.7 Linear Regression-Based Smart Pre-copy Live Migration 10.7.1 Linear Regression Approach 10.7.2 Smart Pre-copy Live Migration 10.8 Conclusion References Chapter 11: Analysis of Security Challenges and Threats in Social Network and Cloud Computing 11.1 Introduction 11.2 Literature Survey 11.3 Social Networks 11.3.1 Popular Social Media Platforms in 11.4 Cloud in Social Networks 11.5 Social Network Attacks 11.6 Cloud Security 11.6.1 Cloud Security Challenges in 11.7 Recommendation for Security and Privacy in Social Networks 11.8 Best Practices to Protect the Data 11.9 Conclusion References Chapter 12: Secured Trusted Authentication with Trust-Based Congestion Scheme for V2V Communication 12.1 Introduction 12.2 Literature Review 12.3 Problem Definition and Solutions 12.4 Method for Secured Vehicular Ad-hoc Network1 Soil Analysis 12.4.1 Real-Time Traffic Generation 12.4.2 Trust-Based Congestion Control and Secure Routing Using Trusted Authentication Scheme 12.4.2.1 Clustering of Vehicle 12.4.2.2 Estimation of Trust Degree 12.4.2.3 Vehicle Monitoring 12.4.2.4 Node-Node Authentication and Trust-Based Authentication 12.5 Results and Discussion 12.5.1 Parameters Used for Traffic Model 12.5.2 Parameters Used for Physical and Link Layers 12.5.3 Parameters Used for Mobility Model 12.5.4 Performance Analysis 12.5.4.1 Throughput 12.5.4.2 Packet Delivery Fraction 12.5.4.3 Control Overhead 12.6 Conclusion References Chapter 13: MQTT Protocol-Based Wide-Range Smart Motor Control for Unmanned Electric Vehicular Application:: A Case Study in IoT 13.1 Introduction 13.2 Literature Review 13.3 Electric Vehicle (EV) Configuration 13.4 System Planning 13.5 Unmanned EV Model 13.6 MQTT Protocol Background 13.6.1 MQTT Protocol Based Speed Control 13.6.2 Closed Loop Speed Control of EV Using IoT 13.7 Expected Output of the Control Scheme 13.7.1 Expected Outcome 13.7.2 Discussion on Prototype 13.8 Conclusions and Future Scope References Chapter 14: IoT-Based Water Quality Monitoring System Using Cloud for Agriculture Use 14.1 Introduction 14.1.1 Urban City Wastewater for Peri-Agriculture 14.1.2 Untreated Water and Human Health 14.1.3 Water Quality Issues in Agriculture Irrigation 14.1.4 Scope of the Chapter 14.2 Related Literature 14.2.1 Concerned Constraints 14.2.2 Wireless Sensor Networks 14.2.3 IoT-Based Monitoring 14.3 System Architecture 14.4 Hardware Requirements 14.5 Application Programming 14.6 System Implementation 14.7 Result and Discussion 14.8 Conclusion and Future Scope References Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.